Shiyu Shen

Orcid: 0000-0001-7287-4223

According to our database1, Shiyu Shen authored at least 18 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things.
IEEE Trans. Computers, July, 2023

XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU.
IACR Cryptol. ePrint Arch., 2023

cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA.
IACR Cryptol. ePrint Arch., 2023

Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023

Bayesian Domain Invariant Learning via Posterior Generalization of Parameter Distributions.
CoRR, 2023

Be Bayesian by Attachments to Catch More Uncertainty.
CoRR, 2023

Poster Abstract: CNN-guardian: Secure Neural Network Inference Acceleration on Edge GPU.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023

2022
Compact and Flexible KEM From Ideal Lattice.
IEEE Trans. Inf. Theory, 2022

Identity-based authenticated encryption with identity confidentiality.
Theor. Comput. Sci., 2022

cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2022

CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes.
IACR Cryptol. ePrint Arch., 2022

High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature.
CoRR, 2022

Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Convolutional Neural Network with a Learnable Spatial Activation Function for SAR Image Despeckling and Forest Image Analysis.
Remote. Sens., 2021

OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice.
CoRR, 2021

2020
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2018
Weakness Identification and Flow Analysis Based on Tor Network.
Proceedings of the 8th International Conference on Communication and Network Security, 2018


  Loading...